GMU-CCAA Project - Getting Started
1. Download the Mesh In App
2. Create your own Mesh identity
Follow the few steps in the app and/or watch explainer videos here.
3. Try it for yourself
Mesh in to the following experiences:
- Hushsafe (try it on mobile and desktop)
- Hushsafe is a demo app that allows you to store 10 secret keycards on the mesh
- Each keycard is encrypted with a unique key derived from the "relationship key" received from your Trustee
- Keys are never exposed outside of the trusted computing environments of the mesh or the legitimate app
- Token Viewer
- Token Viewer allows you to see the content of the ID token that the Trustee passes to applications.
- The token contains standard OpenID Connect claims
- It also includes a unique "relationship key" (AES-256) for encryption/decryption and derivation of other keys
- It includes a "random seed", which is a high-quality random number critical for cryptographic applications
- Relying-Party Registration Tool
- The Relying Party Registration Tool allows you to register relying party apps for testing purposes
- It enables OIDC-style registration of web/mobile apps
4. Consider starting your own project (Optional)
The mesh is a neutral cybersecurity platform for everyone. The unique "relationship key" in the ID token, delivered to each application by the Truste itself, enables all relying parties to encrypt any data that must be "secured" (as in attached) to the specific user. The application does not need to store this key, as it will be returned each time the user meshes in.
Read up on how to build your own relying party app:
- Hushmesh Developer Portal
- This is a first draft of our technical documentation. It explains how the Hushsafe app is built to help you build your own app. Your feedback is welcome @ email@example.com
We invite you to start your own "proof of concept" project to make use of the unique "relationship key". Any use case that traditionally requires a human to manage a secret or a key is a great candidate. Examples of such projects include:
- Password manager integrations
- Encrypted document storage/exchange
- Document signing
- SSH key management
- "Credential providers" to mesh in to local OS
- Cryptographic wallets and blockchain applications
- Integration with legacy identity systems
- End-to-end cryptographic security for IoT and critical infrastructure
- Personal cryptographic server
- FIDO2 browser extension
Contact us at firstname.lastname@example.org if you have an idea and want to validate its relevance/feasibility.
5. Sign up for a FREE Trustee
We will stagger the distribution of Trustees over the next few months. Please sign up and we will contact you when you are selected to receive yours. We will include a discount code to let you "purchase" a Trustee for free.
We may prioritize participants with interesting project ideas depending on overall demand.